In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
|Base Score:||6.5||Base Metrics:||AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H|
|Access Vector:||Network||Attack Complexity:||Low|
|Privileges Required:||None||User Interaction:||Required|
|Integrity Impact:||None||Availability Impact:||High|
|Oracle Linux version 8 (libxml2)||ELSA-2022-5317||2022-07-01|
|Oracle Linux version 9 (libxml2)||ELSA-2022-5250||2022-06-30|
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team